SourceCodester Vehicle Management System 10, Cross-Site Scripting (XSS), CVE-2025-2377 (Medium)

Listen to this Post

How the CVE Works

CVE-2025-2377 is a stored Cross-Site Scripting (XSS) vulnerability in SourceCodester Vehicle Management System 1.0. The flaw exists in the `/confirmbooking.php` file due to improper sanitization of the `id` parameter. An attacker can inject malicious JavaScript payloads via this parameter, which are then executed when an admin or user views the affected booking entry. The vulnerability is remotely exploitable with low privileges, requiring only user-level interaction. The CVSS 4.0 score of 5.1 (MEDIUM) reflects its moderate impact due to the need for user interaction and limited scope.

DailyCVE Form

Platform: SourceCodester
Version: 1.0
Vulnerability: Stored XSS
Severity: Medium
Date: 05/14/2025

What Undercode Say:

Exploitation:

  1. Craft a malicious booking request with XSS payload in the `id` parameter:
    POST /confirmbooking.php HTTP/1.1
    Host: target.com
    id=<script>alert(document.cookie)</script>
    
  2. Use social engineering to trick an admin into viewing the booking.

Detection:

curl -sk "http://target.com/confirmbooking.php?id=test" | grep -q "unsafe" && echo "Vulnerable"

Mitigation:

1. Patch: Apply vendor updates.

2. Sanitize input in `/confirmbooking.php`:

$id = htmlspecialchars($_GET['id'], ENT_QUOTES, 'UTF-8');

3. Deploy a WAF with XSS filtering:

location ~ confirmbooking.php {
set $block_xss 0;
if ($args ~ "<script") { set $block_xss 1; }
if ($block_xss = 1) { return 403; }
}

Log Analysis:

grep -i "confirmbooking.php?id=" /var/log/apache2/access.log | awk '{print $1, $7}'

References:

Impact: Cookie theft, session hijacking, admin compromise.

Note: Disclose responsibly; unpatched systems are actively targeted.

End of Report

Sources:

Reported By: nvd.nist.gov
Extra Source Hub:
Undercode

Join Our Cyber World:

💬 Whatsapp | 💬 TelegramFeatured Image

Scroll to Top